Hiding in plain sight: The stealthy attack chain of PDF files
Over 400-billion PDFs were opened last year, and 16-billion documents were edited in Adobe Acrobat. Over 87% of organisations use PDFs as a standard file format for business communication, making them ideal vehicles for attackers to hide malicious code. Cybercriminals...
Catastrophic cyberattacks can hit anyone
In today's interconnected world, the spectre of cyberattacks looms large over businesses of all sizes and across all industries. From small startups to multinational conglomerates, every organisation is at risk of devastating cyber threats. Last month, JSE-listed...

How to safeguard your AI Investments
Across South Africa, artificial intelligence (AI) is redefining industries, inspiring innovation, improving operations, and driving growth, writes Doug Woolley, GM and vice-president of Dell Technologies South Africa. The government and businesses are capitalising on...
Trend Micro to open-source model and AI agent
Trend Micro has announced the open-sourcing of Trend Cybertron, an AI model and agent framework designed to accelerate the development of autonomous cybersecurity agents. As one of the first specialised cybersecurity large language models (LLMs), it provides...
Cyberint puts Check Point in attack surface management lead
Check Point Software Technologies has emerged as a leading player in Attack Surface Management (ASM) with its acquisition of Cyberint, as highlighted in the recent GigaOm Radar report. Cyberint, recognised as a top performer in the Maturity/Platform Play quadrant, now...
Prevent your WhatsApp account from being hacked
A user's messaging app account might be of interest not only to jealous spouses and nosy coworkers, but also to cybercriminals. Stolen WhatsApp accounts are used for various types of criminal activity, ranging from spam distribution to sophisticated scam schemes....
Legislation tightens cyber defences for financial services
Automated processes across banking, financing, insurance and other financial services are dependent on complex infrastructures that span both on-premises data centres and cloud service providers. This dependency on third-party service providers and technology vendors...
Insights on AI-enabled cybercrime
Over the last year, discussions about AI-enabled cybercrime have shifted from speculation about impacts to real-world observations, writes Derek Manky, chief security strategist and global vice-president: threat intelligence at Fortinet. Malicious actors continue to...
As AI unleashes new threats, we need a new cybersecurity approach
Imagine coming to the end of a lengthy recruitment process, only to find out the candidate you’ve been dealing with during several rounds of in-depth interviews isn’t real. By Yash Pillay, sales engineer at Trend Micro In fact, the person you’ve just hired doesn’t...

How you could thrive without passwords
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals, writes By Kumar Vaibhav, lead senior solution architect:...

The role of advanced technologies in ransomware recovery
The threat of ransomware attacks looms large, compelling organisations to rethink their data management strategies. By Modeen Malick, principal systems engineer at Commvault As businesses increasingly adopt cloud technologies, the complexities of maintaining...
Kaspersky extends targeted attack protection
Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA). With the launch of KATA 7.0, organisations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats detection...